You are on page 1of 7

International Journal on Future Revolution in Computer Science & Communication Engineering ISSN: 2454-4248

Volume: 3 Issue: 10 248 – 254


_______________________________________________________________________________________________
Enhanced Home Registration Security Protocol in MobileIPv6

Dr. Sridevi
Assistant Professor, Department of Computer Science,
Karnatak University, Dharwad

Abstract:- The Enhanced Home Registration (EHR) protocol extends the basic home registration protocol defined in MIPv6 to support the
location authentication of MNs to their HAs. The EHR is based on novel ideas of segmenting the IPv6 address space, using a symmetric CGA-
based technique for generating CoAs, and applying concurrent CoAs reachability tests. As a result, EHR is able to reduce the likelihood of a
malicious MN being successful in luring an HA to flood a third party with useless packets using MIPv6. In addition, EHR enables HAs to help
in correspondent registrations by confirming MNs' CoAs to CNs.
Keywords: MobileIPv6, Enhanced Home Registration,Cryptographically generated addresses,Mobile Node. Etc.
__________________________________________________*****_________________________________________________
1. Introduction node allocates the sequence number as a value above the one
A mobile node can commence a procedure called Home sent in the prior BU towards the HA (only if applicable).
registration, with the purpose of reporting the HA on the Moreover, if the primary objective is eradicating the node’s
present physical coordinates of the mobile node. It is binding entry at HA, the mobile note will establish the CoA
achieved by the implementation of BU and BA mobility as identical with its HoA and present the binding contract as
messages. In the instance that mobile node travels farther nil. Conclusively, if a span of a single second passes without
away from the reach of home link, the node transmits a the MN receiving appropriate response to the BA message,
query towards the home router to fulfil the function of a the message will be resubmitted by the mobile node. The
home agent through registering its CoA under the router. transformation procedure is multiplied through each
This procedure also facilitates the mobile node to provide retransmission, until either appropriate response is acquired,
updated information towards the HA regarding the CoA or the entire process spans over the highest permissible
following transition onto a separate, foreign link. In order to thirty-two seconds. Subsequently, the mobile node will
lengthen the cycle of registration reaching expiry, or continuously request transmission through BU messaging,
eradicate a registry once home link has been returned. however, this is only expected if the locality hosts only a
MIPv6 considers safety and protection of home routers as single HA. After sufficient delay has passed, the mobile
critical to mitigate the possibilities of invasions. The mobile node will attempt connection to another HA, if available.
node utilizes HA services belonging to identical A BA message is constituted by the mobile node’s HoA, the
management platform. Therefore, it can be thought that a provided binding lifetime, a sequence number, which is
relation between the HA and mobile node previously exists, identical the number held under the BU message, and
and therefore the two elements are capable of sharing possibly, binding refresh advice. The granted binding should
previously-defined security codes (or different recognition ideally be lesser compared to binding refresh advice, could
platforms, i.e. certifications) to facilitate development of a be facilitated through the BA message recommending that
bidirectional IPSec Security Association (SA), which could the mobile node refresh home registrations over shorter
afterwards be deployed for the protection of home spans. Conversely, in the condition the the mentioned
registrations. As conclusion, MIPv6 platform utilizes IPSec assessments yield negative results, or the DAD evaluation
Encapsulating Security Payload (ESP) and sequence shows failure, the binding will be entirely rejected by the
numbering as measures to secure exchange of traffic amidst HA, alongside appropriate response citing the reason and
HA and MN. The administrative traffic incorporates BU and motive for termination through a provided value.
BA mobility messages, carried though Mobility Header In the condition that a BA is being acquired through the HA,
under IPv6. the mobile node assesses IPSec SA that has to be utilized.
A mobile node begins registration through transmitting with Subsequently, the mobile node reaffirms the credibility and
the HA an BU message, the constituents of the message viability of the received BA messages. The sequence
incorporates the mobile node’s HoA, sequence number, number provided through the BA is too reaffirmed for
present CoA and binding contract. It is necessary for the credibility and viability, compared against the number
mobile node to offer its CoA under the header even under provided by the mobile node, as kept under corresponding
the condition that the CoA imitates the BU’s source address. Binding Update List. In the condition that even a single
This occurs given the fact that IPSec ESP under authentication fails, the messages will be immediately
transmission setting provides no security towards the IPv6 discarded by the mobile network with no possible
header. In order to mitigate potential invasions, the mobility alternatives

248
IJFRCSCE | October 2017, Available @ http://www.ijfrcsce.org
_______________________________________________________________________________________
International Journal on Future Revolution in Computer Science & Communication Engineering ISSN: 2454-4248
Volume: 3 Issue: 10 248 – 254
_______________________________________________________________________________________________
The utilization of sequence numbers and IPSec provides traffic using the MIPv6 protocol.
limited security to home registrations against invasions. The EHR protocol extends the basic home registration
Particularly, invaders can be prevented from transferring protocol defined in the MIPv6 base document by making
decayed or infected messages. Moreover, it can also mitigate use of a combination of three ideas. Firstly, it uses a novel
the capability of an actual mobile node to send a BU as lightweight version of the traditional CGA-based technique
representative of some other mobile node accessing through to cryptographically generate and verify MNs' CoAs. This is
identical HA. called the symmetric CGA-based technique. This technique
2. Enhanced Home Registration (EHR) Protocol makes use of a secret key shared between an MN and its HA
The basic home registration process included in the MIPv6 in the CoA generation and verification processes.
protocol to enable an MN to register its current CoA with an 3. The Concurrent CoA Reachability Test
HA. The investigation showed that the HA could not The entire aspect of creation CoA through cryptography is
authenticate the given CoA. Therefore, the MN could lie preceded by the consideration of present CoA viability
about its current location and lure the HA to redirect traffic evaluations to assess the mobile node’s viability over the
to a third party causing a DoS attack against that third party. claimed CoAs. Such an assessment would facilitate HA to
An enhanced home registration process to support location register and utilize the mobile node’s new CoA whilst
authentication of MNs to their respective HAs. This is called evaluating the mobile note’s viability towards the CoA. Two
the Enhanced Home Registration (EHR) protocol. The EHR messages are utilized by the assessment: Binding
protocol allows an HA to verify that a claimed CoA is Acknowledgement with Care-of Token (BACoT) message
indeed an MN's real location. As a result, the EHR protocol and a Binding Update with Care-of Token (BUCoT)
can reduce the likelihood of a malicious MN being message.
successful in luring an HA to flood a third party with useless

Figure 1: Procedure 1 - executed by an HA upon receipt of a valid BU message


249
IJFRCSCE | October 2017, Available @ http://www.ijfrcsce.org
_______________________________________________________________________________________
International Journal on Future Revolution in Computer Science & Communication Engineering ISSN: 2454-4248
Volume: 3 Issue: 10 248 – 254
_______________________________________________________________________________________________
The reachability test is initiated as soon as an HA receives a idea of a `node key. The node key is only known to an HA,
valid BU message from an MN. HA replies by sending a and it allows the HA to verify that a token enclosed in a
BACoT message to the MN. The BACoT message BUCoT message is indeed its own. The HA generates a
acknowledges the binding of the new CoA and delivers a fresh node key at regular intervals and identifies it by an
fresh care-of token to the MN. The MN uses the received index. The HA produces a fresh care-of token based on its
token to show its presence at the new CoA, i.e. the MN active node key as well as values of the MN's HoA, the
sends a BUCoT message containing the received token to MN's claimed CoA, and the sequence number received in a
the HA. When the test concludes, the HA sends a BA valid BU message. The HA may use the same node key with
message to the MN acknowledging the receipt of the token; all of the MNs it is in communication with to avoid the need
hence, the successful completion of the reachability test. A to store a token per MN.
care-of token is a 64-bit number that is produced using the

Figure 2: Procedure 2 – implemented through HA based on affirmation of a received, reliable BUCoT message
4. EHR Protocol Description
The EHR protocol is based on three fundamental ideas; (1) addresses. The EHR protocol adds the three ideas
cryptographically create CoA of mobile nodes through a mentioned above to the basic home registration protocol to
shared secret key; (2) affirm the MNs' credibility regarding help HAs authenticate MNs' CoAs. The whole picture of the
the claimed CoAs; and (3) discern amongst various types of EHR protocol is illustrated in Figures 3 and 4.

250
IJFRCSCE | October 2017, Available @ http://www.ijfrcsce.org
_______________________________________________________________________________________
International Journal on Future Revolution in Computer Science & Communication Engineering ISSN: 2454-4248
Volume: 3 Issue: 10 248 – 254
_______________________________________________________________________________________________

Figure 3: EHR protocol at mobile node side


The EHR protocol is based on the BHR protocol; it also uses falsely sending BU messages on behalf of other MNs.
IPSec ESP and sequence numbers to protect home Furthermore, the EHR protocol extends the BHR protocol to
registrations. Therefore, the EHR protocol has the same support the location authentication of MNs to their HAs. It
security protection as the BHR protocol. Specifically, it can adds the novel ideas of segmenting the IPv6 address space,
protect home registrations against outsider attacks; an using a symmetric CGA-based technique for generating
attacker cannot send a spoofed or a replayed BU message CoAs, and applying concurrent CoAs reachability tests to
instead of the MN. It also can prevent malicious MNs from the basic home registration protocol.

Figure 4: EHR protocol at home agent side


251
IJFRCSCE | October 2017, Available @ http://www.ijfrcsce.org
_______________________________________________________________________________________
International Journal on Future Revolution in Computer Science & Communication Engineering ISSN: 2454-4248
Volume: 3 Issue: 10 248 – 254
_______________________________________________________________________________________________
5. Performance Evaluation OPNET debugger to signify that the EHR protocol to be
Assessment of ERH performance through contrasting it with operating as normal. The OPNET debugger is implemented
basic (BHR) protocol. This can be facilitated through to assess the performance of both processes; CoT and CoA.
utilizing OPNET Modeler simulation software and Moreover, applicable packet details (i.e., value of CoT,
CryptoSys Cryptography Toolkit. A concise introduction on packet size, source address, destination address and value of
these elements is provided under Appendix C. The modifier) has been evaluated during operational procedures.
productivity is assessed in regards to delay in home 5.2 Theoretical Model
registration, assessed in seconds while overhead signalling In order to facilitate validation and simulation, the equation
evaluated through bits per second. The HR-Delay is for calculating theoretical value of the HR-Delay is provided
elaborated as the aggregate time consumed by the mobile below:
node to achieve a message of acknowledgement (i.e. a HR _Delay = Delay for BU message + Delay for BACoT
BACoT in the EHR protocol or a BA in the BHR protocol) message
from HA, following release of a BU message. Overhead + Delay for HoA DAD test (4.1)
signalling is the aggregated volume of Mobile IPv6 Four types of delays are responsible for causing the delay in
signaling traffic exchanged over the HA and mobile node the transmission of both BU and BACoT: transmission
5.1 Simulation Model Validation delay, propagation delay, queuing delay, and processing
For achieving such, an authentication procedure comprising delay.
two phases is utilized. The first phase includes utilization of

Figure 4.8: Theoretical delay for BU message


Total Delay for BU Message = MN Delay + AR Delay + Internet Delay + HR Delay

Figure 4.9: Theoretical delay for BACoT message

Total Delay for BACoT Message = HA Delay + Internet consumed by packet's bits to proliferate onto other networks.
Delay + AR Delay + MN Delay The formula for assessment of propagation delay is provided
Transmission Delay:Transmission delay is the necessary below:
volume of time for transmission of packets towards their Propagation -Delay = Distance /
intended designation, the formula for assessment of Propagation Speed
transmission delay is provided below: Queuing Delay:Queuing delay constitutes of delays in
Transmission-Delay = Packet Size / regards to both the transmission and receiving messages.
Bandwidth The latter is the volume of time that a message has to wait
Packet Size is the determination of aggregate bits present before processing can occur, whilst the former is the
under a packet, whilst Bandwidth elaborates the particulate measurement of time spent on waiting for the transmission
rate of data transmission for a link. of the message.
Propagation Delay: Propagation delay is aggregate time Processing Delay:Processing delay points towards the
252
IJFRCSCE | October 2017, Available @ http://www.ijfrcsce.org
_______________________________________________________________________________________
International Journal on Future Revolution in Computer Science & Communication Engineering ISSN: 2454-4248
Volume: 3 Issue: 10 248 – 254
_______________________________________________________________________________________________
necessary time spent for the processing of inbound and Home Registration Delay: This provides an assessment on
outbound packets at both nods, respectively. The procedure the HR-Delay simulation conclusions. An entire assortment
delay towards EHR protocols dependant on HMAC_ SHA1 of simulation results is depicted, beginning from Figure
delay. The HMAC_SHA1 element is utilization through 5shows that the HoA DAD delay is programme to nil, even
home agent two times to affirm the CoA’s integrity and during the initial registration of CoA at a HA, i.e. set to zero
create a new CoT. The HMAC_SHA1 latency is assessed. even during the first registration of a CoA at an HA, i.e.
6.Simulation Results when an mobile node transition from subnet towards a
Results from the simulation provides and processes foreign subnet. The delay is assessed through utilizing an
simulation results acquired from the research regarding both arbitrary values generated through a random generator,
HR-Delay and control signaling overhead. It contrasts the which greatly influences the viability of acquired results.
conclusion regarding both EHR and BHR protocols.

Figure 5: HR-Delay for BHR and EHR protocols vs. handover (one MN, three CNs, 0% load)

6.1 Control Signaling Overhead  Firstly, the productivity of both protocols can be
Figure 6 depict control signalling overheads towards the considered virtually the same when it comes to
mobile node side and HA’s side, respectively. Commonly, delisting.
the motive for any deviation in control signalling at the  Secondly, the productivity of both protocols can be
mobile nodes is primarily due to the fluctuation in length considered virtually the same it comes to HR-
and volume of the signalling messages exchanged. Delay.
 Thirdly, the influence of incrementing number of
transitioning mobile nodes facilitated by the same
HA, on which the productivity of the EHR protocol
is greater in comparison to BHR protocol.
 Fourthly, the EHR facilitates multiplies control
signalling at both the mobile node and HA as
significant payment for adding the location
authentication of MNs towards their HAs.
The primary conclusion would be that if a contrast between
both protocols was to be executed, and the valuation in
performed on basis of efficiency and safety, the ERH would
begin consolidating soon enough.

7. Conclusion
Figure 6: Control signalling overhead (bits/sec) for BHR and
This paper brought forward comprehensive detail regarding
EHR protocols at HA
designing for novel enhanced home registration (EHR)
The following observations have been drafted from results
platform which allows HAs to assess mobile node’s
of thorough simulation, provided below:
253
IJFRCSCE | October 2017, Available @ http://www.ijfrcsce.org
_______________________________________________________________________________________
International Journal on Future Revolution in Computer Science & Communication Engineering ISSN: 2454-4248
Volume: 3 Issue: 10 248 – 254
_______________________________________________________________________________________________
ownership over claimed CoAs. The EHR platform utilizes a
combination of three fundamental ideas. Firstly, CoAs is
established through cryptography means through utilizing
cryptographically using a symmetric CGA-based technique.
Secondly, it implements a simultaneous CoA viability and
reachability to affirm MN’s reachability at a CoAs. Finally,
a novel procedure is used for assessing the host type based
on their IPv6 addresses. A simulation model of EHR has
been constructed using the OPNET Modeller and relevant
calculations. The assessment of simulation conclusion
expressed that EHR provides trivial delay in the entire
registering process, however, but also substantially
increments signaling overhead.
References

[1] D. Johnson, C. Perkins, and J. Arkko, "Mobility Support


in IPv6." RFC 3775 (Proposed Standard), June 2004.
[2] C. Vogt, R. Bless, M. Doll, and T. Kuefner, "Early
Binding Updates for Mobile IPv6," in Wireless
Communications and Networking Conference, 2005
IEEE, vol. 3, pp. 1440{1445, March 2005.
[3] C. Vogt, "Credit-Based Authorization for Concurrent IP-
Address Tests," Tech. Rep. TM-2005-3, Institute of
Telematics, University of Karlsruhe, Germany,June
2005.
[4] S. Bradner, A. Mankin, and J. Schiller, "A Framework
for Purpose Built Keys (PBK)," Expired Internet-Draft:
draft-bradner-pbk-frame-06.txt, June 2003.
[5] C. Perkins, "Securing Mobile IPv6 Route Optimization
Using a Static Shared Key." RFC 4449 (Proposed
Standard), June 2006.
[6] T. Narten, E. Nordmark, W. Simpson, and H. Soliman,
“Neighbor Discovery for IP version 6 (IPv6)." RFC 4861
(Draft Standard), Sept. 2007.
[7] S. Thomson, T. Narten, and T. Jinmei, “IPv6 Stateless
Address Autoconconfiguration" RFC 4862 (Draft
Standard), Sept. 2007.
[8] M.-S. Hwang, C.-C. Lee, and S.-K. Chong, “An
improved address ownership in mobile IPv6," Computer
Communications, vol. 31, no. 14, pp. 3250-3252,2008.
[9] S. Gunderson, \Global IPv6 Statistics - Measuring the
current state of IPv6 for ordinary users." A study by
Google, reported in November 2008.

254
IJFRCSCE | October 2017, Available @ http://www.ijfrcsce.org
_______________________________________________________________________________________

You might also like